5 research outputs found

    Asset Criticality in Mission Reconfigurable Cyber Systems and its Contribution to Key Cyber Terrain

    Get PDF
    The concept of a common operational picture has been utilized by the military for situational awareness in warfare domains for many years. With the emergence of cyberspace as a domain, there is a necessity to develop doctrine and tools to enable situational awareness for key-decision makers. Our study analyzes key elements that define cyber situational awareness to develop a methodology to identify assets within key cyber terrain, thus enabling situational awareness at the tactical level. For the purposes of this work, we treat critical assets to be key cyber terrain, given that no formal study has determined differences between asset criticality and key cyber terrain. Mission- and operationally- based questions are investigated to identify critical assets with the TOPSIS methodology. Results show that the ICS system can be evaluated using TOPSIS to identify critical assets contributing to key cyber terrain, enabling further research into other interconnected systems

    Asset Criticality in Mission Reconfigurable Cyber Systems and its Contribution to Key Cyber Terrain

    Get PDF
    Proceedings of the 50th Hawaii International Conference on System Sciences | 2017The article of record as published may be found at https://doi.org/10.24251/HICSS.2017.729The concept of a common operational picture has been utilized by the military for situational awareness in warfare domains for many years. With the emergence of cyberspace as a domain, there is a necessity to develop doctrine and tools to enable situational awareness for key-decision makers. Our study analyzes key elements that define cyber situational awareness to develop a methodology to identify assets within key cyber terrain, thus enabling situational awareness at the tactical level. For the purposes of this work, we treat critical assets to be key cyber terrain, given that no formal study has determined differences between asset criticality and key cyber terrain. Mission- and operationally- based questions are investigated to identify critical assets with the TOPSIS methodology. Results show that the ICS system can be evaluated using TOPSIS to identify critical assets contributing to key cyber terrain, enabling further research into other interconnected systems

    Protecting the Protector: Mapping the Key Terrain that Supports the Continuous Monitoring Mission of a Cloud Cybersecurity Service Provider

    Get PDF
    Key terrain is a concept that is relevant to warfare, military strategy, and tactics. A good general maps out terrain to identify key areas to protect in support of a mission (i.e., a bridge allowing for mobility of supplies and reinforcements). Effective ways to map terrain in Cyberspace (KT-C) has been an area of interest for researchers in Cybersecurity ever since the Department of Defense designated Cyberspace as a warfighting domain. The mapping of KT-C for a mission is accomplished by putting forth efforts to understand and document a mission\u27s dependence on Cyberspace and cyber assets. A cloud Cybersecurity Service Provider (CSSP) continuously monitors the network infrastructure of an information system in the cloud ensuring its security posture is within acceptable risk. This research is focused on mapping the key terrain that supports the continuous monitoring mission of a cloud CSSP. Traditional methods to map KT-C have been broad. Success has been difficult to achieve due to the unique nature of the Cyberspace domain when compared to traditional warfighting domains. This work focuses on a specific objective or mission within cyberspace. It is a contextual approach to identify and map key terrain in cyberspace. Mapping is accomplished through empirical surveys conducted on Cybersecurity professionals with various years of experience working in a cloud or CSSP environment. The background of the Cybersecurity professionals participating in the survey will include United States Government personnel/contractors, and other Cybersecurity practitioners in the private sector. This process provided an approach to identify and map key terrain in a contextual manner specific to the mission of a typical cloud CSSP. Practitioners can use it as a template for their specific cloud CSSP mission

    Decision Support Elements and Enabling Techniques to Achieve a Cyber Defence Situational Awareness Capability

    Full text link
    [ES] La presente tesis doctoral realiza un an谩lisis en detalle de los elementos de decisi贸n necesarios para mejorar la comprensi贸n de la situaci贸n en ciberdefensa con especial 茅nfasis en la percepci贸n y comprensi贸n del analista de un centro de operaciones de ciberseguridad (SOC). Se proponen dos arquitecturas diferentes basadas en el an谩lisis forense de flujos de datos (NF3). La primera arquitectura emplea t茅cnicas de Ensemble Machine Learning mientras que la segunda es una variante de Machine Learning de mayor complejidad algor铆tmica (lambda-NF3) que ofrece un marco de defensa de mayor robustez frente a ataques adversarios. Ambas propuestas buscan automatizar de forma efectiva la detecci贸n de malware y su posterior gesti贸n de incidentes mostrando unos resultados satisfactorios en aproximar lo que se ha denominado un SOC de pr贸xima generaci贸n y de computaci贸n cognitiva (NGC2SOC). La supervisi贸n y monitorizaci贸n de eventos para la protecci贸n de las redes inform谩ticas de una organizaci贸n debe ir acompa帽ada de t茅cnicas de visualizaci贸n. En este caso, la tesis aborda la generaci贸n de representaciones tridimensionales basadas en m茅tricas orientadas a la misi贸n y procedimientos que usan un sistema experto basado en l贸gica difusa. Precisamente, el estado del arte muestra serias deficiencias a la hora de implementar soluciones de ciberdefensa que reflejen la relevancia de la misi贸n, los recursos y cometidos de una organizaci贸n para una decisi贸n mejor informada. El trabajo de investigaci贸n proporciona finalmente dos 谩reas claves para mejorar la toma de decisiones en ciberdefensa: un marco s贸lido y completo de verificaci贸n y validaci贸n para evaluar par谩metros de soluciones y la elaboraci贸n de un conjunto de datos sint茅ticos que referencian un铆vocamente las fases de un ciberataque con los est谩ndares Cyber Kill Chain y MITRE ATT & CK.[CA] La present tesi doctoral realitza una an脿lisi detalladament dels elements de decisi贸 necessaris per a millorar la comprensi贸 de la situaci贸 en ciberdefensa amb especial 猫mfasi en la percepci贸 i comprensi贸 de l'analista d'un centre d'operacions de ciberseguretat (SOC). Es proposen dues arquitectures diferents basades en l'an脿lisi forense de fluxos de dades (NF3). La primera arquitectura empra t猫cniques de Ensemble Machine Learning mentre que la segona 茅s una variant de Machine Learning de major complexitat algor铆tmica (lambda-NF3) que ofereix un marc de defensa de major robustesa enfront d'atacs adversaris. Totes dues propostes busquen automatitzar de manera efectiva la detecci贸 de malware i la seua posterior gesti贸 d'incidents mostrant uns resultats satisfactoris a aproximar el que s'ha denominat un SOC de pr貌xima generaci贸 i de computaci贸 cognitiva (NGC2SOC). La supervisi贸 i monitoratge d'esdeveniments per a la protecci贸 de les xarxes inform脿tiques d'una organitzaci贸 ha d'anar acompanyada de t猫cniques de visualitzaci贸. En aquest cas, la tesi aborda la generaci贸 de representacions tridimensionals basades en m猫triques orientades a la missi贸 i procediments que usen un sistema expert basat en l貌gica difusa. Precisament, l'estat de l'art mostra serioses defici猫ncies a l'hora d'implementar solucions de ciberdefensa que reflectisquen la rellev脿ncia de la missi贸, els recursos i comeses d'una organitzaci贸 per a una decisi贸 m茅s ben informada. El treball de recerca proporciona finalment dues 脿rees claus per a millorar la presa de decisions en ciberdefensa: un marc s貌lid i complet de verificaci贸 i validaci贸 per a avaluar par脿metres de solucions i l'elaboraci贸 d'un conjunt de dades sint猫tiques que referencien un铆vocament les fases d'un ciberatac amb els est脿ndards Cyber Kill Chain i MITRE ATT & CK.[EN] This doctoral thesis performs a detailed analysis of the decision elements necessary to improve the cyber defence situation awareness with a special emphasis on the perception and understanding of the analyst of a cybersecurity operations center (SOC). Two different architectures based on the network flow forensics of data streams (NF3) are proposed. The first architecture uses Ensemble Machine Learning techniques while the second is a variant of Machine Learning with greater algorithmic complexity (lambda-NF3) that offers a more robust defense framework against adversarial attacks. Both proposals seek to effectively automate the detection of malware and its subsequent incident management, showing satisfactory results in approximating what has been called a next generation cognitive computing SOC (NGC2SOC). The supervision and monitoring of events for the protection of an organisation's computer networks must be accompanied by visualisation techniques. In this case, the thesis addresses the representation of three-dimensional pictures based on mission oriented metrics and procedures that use an expert system based on fuzzy logic. Precisely, the state-of-the-art evidences serious deficiencies when it comes to implementing cyber defence solutions that consider the relevance of the mission, resources and tasks of an organisation for a better-informed decision. The research work finally provides two key areas to improve decision-making in cyber defence: a solid and complete verification and validation framework to evaluate solution parameters and the development of a synthetic dataset that univocally references the phases of a cyber-attack with the Cyber Kill Chain and MITRE ATT & CK standards.Llopis S谩nchez, S. (2023). Decision Support Elements and Enabling Techniques to Achieve a Cyber Defence Situational Awareness Capability [Tesis doctoral]. Universitat Polit猫cnica de Val猫ncia. https://doi.org/10.4995/Thesis/10251/19424
    corecore